Vulnerability Name: | CVE-2004-0398 (CCN-16192) | ||||||||||||||||
Assigned: | 2004-05-19 | ||||||||||||||||
Published: | 2004-05-19 | ||||||||||||||||
Updated: | 2020-10-09 | ||||||||||||||||
Summary: | Heap-based buffer overflow in the ne_rfc1036_parse date parsing function for the neon library (libneon) 0.24.5 and earlier, as used by cadaver before 0.22, allows remote WebDAV servers to execute arbitrary code on the client. | ||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||
Vulnerability Type: | CWE-787 | ||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||
References: | Source: CCN Type: Full-Disclosure Mailing List, Wed May 19 2004 - 01:36:42 CDT Advisory 06/2004: libneon date parsing vulnerability Source: FULLDISC Type: Broken Link 20040519 Advisory 06/2004: libneon date parsing vulnerability Source: MITRE Type: CNA CVE-2004-0398 Source: CONECTIVA Type: Broken Link CLA-2004:841 Source: BUGTRAQ Type: Third Party Advisory 20040519 Advisory 06/2004: libneon date parsing vulnerability Source: BUGTRAQ Type: Third Party Advisory 20040519 [OpenPKG-SA-2004.024] OpenPKG Security Advisory (neon) Source: CCN Type: RHSA-2004-191 cadaver security update Source: CCN Type: SA11638 Neon Date Parsing Heap Overflow Vulnerability Source: SECUNIA Type: Third Party Advisory 11638 Source: SECUNIA Type: Third Party Advisory 11650 Source: SECUNIA Type: Third Party Advisory 11673 Source: GENTOO Type: Third Party Advisory GLSA-200405-13 Source: GENTOO Type: Third Party Advisory GLSA-200405-15 Source: CCN Type: CIAC Information Bulletin O-148 Linux Neon and Cadaver Buffer Overflow Vulnerability Source: CIAC Type: Broken Link O-148 Source: DEBIAN Type: Third Party Advisory DSA-506 Source: DEBIAN Type: Third Party Advisory DSA-507 Source: DEBIAN Type: DSA-506 neon -- buffer overflow Source: DEBIAN Type: DSA-507 cadaver -- buffer overflow Source: CCN Type: GLSA-200405-13 neon heap-based buffer overflow Source: CCN Type: GLSA-200405-15 cadaver heap-based buffer overflow Source: CCN Type: GLSA-200406-03 sitecopy: Multiple vulnerabilities in included libneon Source: CCN Type: GLSA 200405-13 neon heap-based buffer overflow Source: CCN Type: GLSA 200405-15 cadaver heap-based buffer overflow Source: CCN Type: Conectiva Linux Security Announcement CLA-2004:841 libneon Source: MANDRAKE Type: Third Party Advisory MDKSA-2004:049 Source: CCN Type: OpenPKG-SA-2004.024 neon Source: OSVDB Type: Broken Link 6302 Source: CCN Type: OSVDB ID: 6302 cadaver libneon Date Parsing Overflow Source: REDHAT Type: Third Party Advisory RHSA-2004:191 Source: BID Type: Third Party Advisory, VDB Entry 10385 Source: CCN Type: BID-10385 Neon WebDAV Client Library ne_rfc1036_parse Function Heap Overflow Vulnerability Source: CCN Type: BID-10869 Neon WebDAV Client Library Unspecified Vulnerability Source: CCN Type: neon Web page neon HTTP and WebDAV client library Source: FEDORA Type: Broken Link FEDORA-2004-1552 Source: XF Type: Third Party Advisory, VDB Entry neon-library-nerfc1036parse-bo(16192) Source: XF Type: UNKNOWN neon-library-nerfc1036parse-bo(16192) Source: SUSE Type: SUSE-SA:2004:013 cvs: remote command execution Source: SUSE Type: SUSE-SA:2004:015 cvs: remote command execution Source: SUSE Type: SUSE-SA:2004:016 squid: remote system compromise Source: SUSE Type: SUSE-SA:2004:017 Linux Kernel: local denial-of-service attack Source: SUSE Type: SUSE-SA:2004:018 subversion: remote system compromise Source: SUSE Type: SUSE-SA:2004:019 dhcp-server: remote system compromise Source: SUSE Type: SUSE-SA:2004:020 kernel: local privilege escalation Source: SUSE Type: SUSE-SA:2004:021 php4 / mod_php4: remote code execution Source: SUSE Type: SUSE-SA:2004:022 samba: remote root compromise | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |